1. Herman Aguinis and Kyle J Bradley . 2014. Best practice recommendations for designing and implementing experimental vignette methodology studies. Organizational research methods 17, 4 ( 2014 ), 351–371. Herman Aguinis and Kyle J Bradley. 2014. Best practice recommendations for designing and implementing experimental vignette methodology studies. Organizational research methods 17, 4 (2014), 351–371.
2. Decision making model to predict presence of coronary artery disease using neural network and C5. 0 decision tree;Ahmadi Ehsan;Journal of Ambient Intelligence and Humanized Computing,2018
3. Mutlaq Alotaibi , Steven Furnell , and Nathan Clarke . 2016 . Information security policies: A review of challenges and influencing factors . In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 352–358 . Mutlaq Alotaibi, Steven Furnell, and Nathan Clarke. 2016. Information security policies: A review of challenges and influencing factors. In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 352–358.
4. Marie Bia and Michel Kalika . 2007. Adopting an ICT code of conduct: An empirical study of organizational factors. Journal of Enterprise Information Management ( 2007 ), 3. Marie Bia and Michel Kalika. 2007. Adopting an ICT code of conduct: An empirical study of organizational factors. Journal of Enterprise Information Management (2007), 3.
5. Jane Blanken-Webb , Imani Palmer , Sarah-Elizabeth Deshaies , Nicholas C Burbules , Roy H Campbell , and Masooda Bashir . 2018 . A case study-based cybersecurity ethics curriculum . In 2018 USENIX Workshop on Advances in Security Education (ASE 18) . Jane Blanken-Webb, Imani Palmer, Sarah-Elizabeth Deshaies, Nicholas C Burbules, Roy H Campbell, and Masooda Bashir. 2018. A case study-based cybersecurity ethics curriculum. In 2018 USENIX Workshop on Advances in Security Education (ASE 18).